mmo

Results 1051 - 1075 of 1196Sort Results By: Published Date | Title | Company Name
Published By: Sybase     Published Date: Aug 21, 2009
The paper will explore the differences between smart-client and thin-client mobile architectures. It will then examine the details of common smart-client architectures, including what type of back-end systems they integrate with, the types of devices they support, how data is managed within the architecture, and development languages that can be used to build the application.
Tags : 
mobile app, mobile apps, mobile architecture, mobile device, mobile application, mobile application development, application development, mobile, sybase
    
Sybase
Published By: webMethods     Published Date: Feb 14, 2007
SOA: Service-Oriented Architecture is an approach to building IT systems out of common parts. SOA represents a breakthrough in the way we build IT systems. webMethods customers report overwhelmingly that SOA is providing real value to them.
Tags : 
soa, service-oriented architecture, service oriented architecture, service management, web methods, webmethods
    
webMethods
Published By: webMethods     Published Date: Aug 21, 2009
Selecting the right business integration vendor is a challenge. While it is essential to focus on what is critical for your company, it is also important to evaluate vendors using a common set of metrics. This document uses customer feedback taken from a broad portfolio of evaluations to offer key factors and considerations to use when selecting an integration software vendor.
Tags : 
business integration, integration, return on investment, roi, business process management, bpm, vendor selection, business integration software, choosing a vendor, vendor, web methods, webmethods
    
webMethods
Published By: Quocirca     Published Date: Feb 05, 2007
This paper looks at how to get the best out of mobile productivity and how to avoid the six most common mobility pitfalls during the planning and execution of mobile implementations.
Tags : 
productivity, wireless, mobile workers, wireless application software, wireless communications, wireless hardware, wireless security, return on investment, roi, quocirca, mobile
    
Quocirca
Published By: Quocirca     Published Date: Feb 05, 2008
The financial services industry deals with a commodity that is primarily electronic — money. Consequently it spends more per employee on IT than any other industry.  Despite this, there is a worrying tendency for information that should be confidential to end up in the public domain. Why is this and what can be done?
Tags : 
quocirca, bank, banks, financial services, finserve, finserv, network security, customer data, data protection, intrusion prevention, data security, database security
    
Quocirca
Published By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : 
quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations, ngos, network centric warfare, ncw, standardized battlespace, common operating picture, cop, access points, networking
    
Quocirca
Published By: Opalis     Published Date: Nov 06, 2006
This paper explains how ITIL can improve service delivery through data center integration and automation of best practices. It also highlights common implementation hazards, real-world examples and the tools required to implement ITIL.
Tags : 
itil, datacenter, datacenters, data centers, service management, data integration, itil implementation, opalis
    
Opalis
Published By: Servoy     Published Date: Dec 11, 2006
This white paper on Software as a Service (SaaS) highlights the application development shifts that software vendors must go through to accommodate SaaS.
Tags : 
saas, java, application development, software-as-a-service, product development, software development, application development, servoy
    
Servoy
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, a common issue was rapid growth. The pain points most often cited were manual processes that cause mistakes and inefficiencies, the need for more functionality, an inability to scale to support growth, integration problems, especially with the growing number of customer and partner systems, and a lack of operational insight. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to support rapid growth and drive business success.
Tags : 
microsoft dynamics, crm, compliance
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, the most common issue was the need for modern systems. The pain points most often cited were manual processes that cause mistakes and inefficiencies, integration problems with other systems (both internal and external), lack of operational insight, and legacy software support and customization issues. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to modernize your business processes and drive business success.
Tags : 
microsoft dynamics, crm, compliance
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, a common issue was growth via mergers and acquisitions (M&A). The pain points most often cited were non-integrated, overlapping systems, an inability to scale to support growth, the need for more functionality, and a lack of operational insight. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to support your company’s growth via M&A and drive business success.
Tags : 
microsoft dynamics, crm, compliance, global functionality
    
Microsoft Dynamics
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam, anti spam, email security, zombie, zombies, botnet, botnets, hacker, vulnerability, filtering, blocking, mailessentials, mail essentials
    
GFI
Published By: CCSS     Published Date: Sep 04, 2007
Many IT Managers will be familiar with the ‘disk or die’ ultimatums that a disgruntled system can issue. If the system demands feeding and threatens to shut down if it doesn’t get more disk to chew, it’s time to address the issue of disk once and for all.  The expense of using disk to accommodate problems in the hope of buying extra investigation time is a quick fix that few organizations can sustain.
Tags : 
systems management, monitoring, disk management, disk monitoring, ccss, network performance, network performance management, disk, remote management
    
CCSS
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: AT&T     Published Date: Jun 25, 2008
Class of Service (CoS) functionality can help optimize network performance. For a successful deployment, network designers should identify all applications, understand requirements associated with each application, designate appropriate mapping for groups of applications and provide mechanisms in the underlying network to deliver CoS. CoS mapping and deployment are important; adhering to tested strategies and avoiding common misconceptions helps IT managers advance optimization across the wide area network.
Tags : 
class of service, service management, traffic management, bandwidth, at&t, att, network performance management
    
AT&T
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Budgets are tight in today's business environment. You may be asked to do more with less. Take a look through your equipment room. You may have several devices that work just fine, but they are not visible via your network management system (NMS).
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Organizations today depend upon their networks to increase productivity and reduce network infrastructure and maintenance costs. Accordingly, these networks must be secure and perform reliably in order to accommodate geographically dispersed users. Unplanned remote site downtime due to equipment failure or adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : 
security policies, policy management, authentication, access control, lan, lan security, 802.1x, nevis, nevis networks, precision prospects
    
Nevis Networks
Published By: Red Gate Software     Published Date: Oct 19, 2007
This short white paper discusses the common pitfalls and performance problems .NET developers come across when creating applications. The paper also presents several ways of getting around these issues, so that developers can make their .NET applications perform the way they should.
Tags : 
scalability, performance, performance problem, performance problems, .net, .net application, optimize code, .net profiling, profile .net, complexity, dot net, red-gate, red gate, redgate
    
Red Gate Software
Published By: CopiaTECH     Published Date: Mar 18, 2008
Unmanaged Internet access presents many challenges to organizations that rely on the Web for day-to-day business. Even seemingly-harmless Internet use may expose organizations to productivity loss and serious security threats. While large organizations may have access to expensive, sophisticated security solutions, mid-sized and smaller organizations may not have the budgets or technical staffing required to protect against these threats.
Tags : 
websense, copiatech
    
CopiaTECH
Published By: CommonTime     Published Date: Apr 02, 2008
Many companies that have already invested in IBM Lotus Domino/Notes for their business communications now look to achieve the business benefits that are delivered by mobility solutions. To address this challenge, CommonTime has partnered with Microsoft® to combine key elements our best-of-breed Lotus Domino/Notes mobility solution for Windows Mobile devices with Microsoft’s System Center Mobile Device Manager 2008 (MDM).
Tags : 
wireless device management, mobile device management, mobile workers, asset management, commontime
    
CommonTime
Published By: Arcot     Published Date: Jun 04, 2008
Solutions including one-time-password (OTP) generator tokens, do not offer the same level of protection as the ArcotID against attacks such as the man-in-the-middle attack. The ArcotID secure software credential provides protection against common Internet threats and several futuristic attacks that are becoming popular among fraudsters.
Tags : 
authentication, digital signature, password management, cardholder authentication, arcot, smartcard
    
Arcot
Published By: BlueHornet     Published Date: Apr 12, 2010
Over the next few years, more and more people are expected to check their email on their smartphones, rather than their PCs. In this free whitepaper, you'll learn how the most common mobile operating systems render your HTML emails, and more importantly, what you can do now to optimize your email creative to keep your messages looking great, no matter where they're opened.
Tags : 
bluehornet, email marketing, mobile rendering, smartphones, html email, email marketing services/software
    
BlueHornet
Published By: Aconex     Published Date: Jun 24, 2008
It's a common scenario in the mining and oil & gas industries: the project has been approved to proceed and the pressure is on to get multiple parties – partners, consultants, contractors and suppliers – working together efficiently to meet an aggressive schedule. This challenge is often exacerbated by globalization and by the vast volume of data that flows between the project team.
Tags : 
information management, construction, oil, mining, gas, commodities, energy, aconex, collaboration, project management
    
Aconex
Start   Previous    34 35 36 37 38 39 40 41 42 43 44 45 46 47 48    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.